Search Results for "code encryption" - Page 5

Showing 253 open source projects for "code encryption"

View related business solutions
  • The Most Powerful Software Platform for EHSQ and ESG Management Icon
    The Most Powerful Software Platform for EHSQ and ESG Management

    Addresses the needs of small businesses and large global organizations with thousands of users in multiple locations.

    Choose from a complete set of software solutions across EHSQ that address all aspects of top performing Environmental, Health and Safety, and Quality management programs.
    Learn More
  • AestheticsPro Medical Spa Software Icon
    AestheticsPro Medical Spa Software

    Our new software release will dramatically improve your medspa business performance while enhancing the customer experience

    AestheticsPro is the most complete Aesthetics Software on the market today. HIPAA Cloud Compliant with electronic charting, integrated POS, targeted marketing and results driven reporting; AestheticsPro delivers the tools you need to manage your medical spa business. It is our mission To Provide an All-in-One Cutting Edge Software to the Aesthetics Industry.
    Learn More
  • 1
    LEACrypt

    LEACrypt

    TTAK.KO-12.0223 Lightweight Encryption Algorithm Tool

    ...LEA is included in the ISO/IEC 29192-2:2019 standard (Information security - Lightweight cryptography - Part 2: Block ciphers). This project is licensed under the ISC License. Copyright © 2020-2021 ALBANESE Research Lab Source code: https://github.com/pedroalbanese/leacrypt Visit: http://albanese.atwebpages.com
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    GOST Toolkit ☭

    GOST Toolkit ☭

    Cross-platform GOST Security Suite written in Pure Go

    Multi purpose cross-platform cryptography tool for symmetric encryption, hash digest, cipher-based message authentication code (CMAC) hash-based message authentication code (HMAC), digital signature, shared key agreement (VKO) and PBKDF2 function. GOST is GOvernment STandard of Russian Federation: GOST 28147-89 64-bit block cipher (RFC 5830) GOST R 34.11-94 hash function 256-bit (RFC 5831) GOST R 50739-95 data sanitization method (non-cryptographic) GOST R 34.10-2001 public key signature function (RFC 5832) GOST R 34.10-2012 public key signature function (RFC 7091) GOST R 34.11-2012 Стрибог (Streebog) hash function 256/512-bit (RFC 6986) GOST R 34.12-2015 128-bit block cipher Кузнечик (Kuznechik) (RFC 7801) GOST R 34.12-2015 64-bit block cipher Магма (Magma) Source code: https://github.com/pedroalbanese/gosttk Visit: http://albanese.atwebpages.com
    Downloads: 11 This Week
    Last Update:
    See Project
  • 3
    Aurora Files

    Aurora Files

    Your files in your cloud on your rules

    Aurora Files is an open-source file storage platform for small teams and personal users.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4
    rsptar_gzip

    rsptar_gzip

    TAR based DLL

    C code and DLL (with sample project) with library libarchive and GNU tar 1.34 to list, update, delete, extract and create latest GNU tar files uncompressed or compressed with gzip, gzip2, gzip2 multi-thread, bzip2, bzip3, bzip3 multi-thread, lzip, lzop, lzop2, lzop2 multi-thread, lz4, lz5 multi-thread, lzma, brotli, brotli2 multi-thread, Zstandard, xz , the old Unix compression utility 'compress' (.Z) , compress2 multi-thread (.Z2), zip, 7zip and many more formats with full Unicode support when creating and extracting files in windows, compiled with mingw, notice that we have developed a replacement for tar when running in windows with support to file attributes, it is extensible without breaking compatibility with older files, this means that if in the future we add new features to the format it still will be able to extract older VAL files, this is the recommended mode to be used, the extension is .val, support to AES 256, RC4, Serpent, MARS, RC6 and TWOFISH encryption
    Downloads: 0 This Week
    Last Update:
    See Project
  • Rezku Point of Sale Icon
    Rezku Point of Sale

    Designed for Real-World Restaurant Operations

    Rezku is an all-inclusive ordering platform and management solution for all types of restaurant and bar concepts. You can now get a fully custom branded downloadable smartphone ordering app for your restaurant exclusively from Rezku.
    Learn More
  • 5
    GOSTCrypt ☭

    GOSTCrypt ☭

    GOST R 34.10-2015 Kuznechik Block Cipher Encryption Tool

    GOST R 34.12-2015 Kuznechik block cipher (RFC 7801) with Multilinear Galois Mode (RFC 9058). This project is licensed under the ISC License. Copyright © 2020-2021 ALBANESE Research Lab Source code: https://github.com/pedroalbanese/gostcrypt Visit: http://albanese.atwebpages.com
    Downloads: 2 This Week
    Last Update:
    See Project
  • 6
    GMSM Toolkit ☭

    GMSM Toolkit ☭

    Cross-platform GMSM Security Suite written in Go

    ...Cryptographic Functions: • Asymmetric Encryption/Decryption • Symmetric Encryption/Decryption • Digital Signature (ECDSA) • Shared Key Agreement (ECDH) • Recursive Hash Digest + Check • CMAC (Cipher-based message authentication code) • HMAC (Hash-based message authentication code) • PBKDF2 (Password-based key derivation function 2) • TLS Copyright (c) 2020-2021 Pedro Albanese - ALBANESE Lab.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    AESCrypt

    AESCrypt

    NIST SP800-38D AES-GCM Encryption Utility written in Go

    Rijndael256 (FIPS 197) with Galois/Counter Mode (AES-GCM) provides both authenticated encryption (confidentiality and authentication) and the ability to check the integrity and authentication of additional authenticated data (AAD) that is sent in the clear. AES-GCM is specified in NIST Special Publication 800-38D [SP800-38D]. This project is licensed under the ISC License. Copyright © 2020-2021 ALBANESE Research Lab Source code: https://github.com/pedroalbanese/aescrypt Visit: http://albanese.atwebpages.com
    Downloads: 2 This Week
    Last Update:
    See Project
  • 8
    GameNetworkingSockets

    GameNetworkingSockets

    Reliable & unreliable messages over UDP

    ...The basic idea is for the receiver to efficiently communicate to the sender the status of every packet number (whether or not a packet was received with that number). By remembering which segments were sent in each packet, the sender can deduce which segments need to be retransmitted. Encryption. AES-GCM-256 per packet, Curve25519 for key exchange and cert signatures. The details for shared key derivation and per-packet IV are based on the design used by Google's QUIC protocol. This library has shipped on consoles, mobile platforms, and non-Steam stores, and has been used to facilitate cross-platform connectivity. Contact us to get access to the code.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    SM3SUM(2)

    SM3SUM(2)

    Command-line GM/T 0004-2012 SM3 Recursive Hashsum Tool

    This new module can be used to compute SM3 message digest of files or memory blocks according to the specification GM/T 004-2012 Cryptographic Hash Algorithm SM3, published by State Encryption Management Bureau, China. This project is licensed under the ISC License. Copyright © 2020-2022 ALBANESE Research Lab Source code: https://github.com/pedroalbanese/sm3sum Visit: http://albanese.atwebpages.com
    Downloads: 0 This Week
    Last Update:
    See Project
  • Skillfully - The future of skills based hiring Icon
    Skillfully - The future of skills based hiring

    Realistic Workplace Simulations that Show Applicant Skills in Action

    Skillfully transforms hiring through AI-powered skill simulations that show you how candidates actually perform before you hire them. Our platform helps companies cut through AI-generated resumes and rehearsed interviews by validating real capabilities in action. Through dynamic job specific simulations and skill-based assessments, companies like Bloomberg and McKinsey have cut screening time by 50% while dramatically improving hire quality.
    Learn More
  • 10
    CodeIgniter

    CodeIgniter

    Open Source PHP Framework (originally from EllisLab)

    ...It adopts an MVC-style or loosely structured approach depending on developer preference, with core components for routing, input handling, output views, and database abstraction. The framework provides convenience libraries for sessions, form validation, encryption, email, file uploads, and more, all optional so the footprint stays small. Because it doesn’t force heavy conventions, CodeIgniter is flexible for both small projects and larger modular applications where you may want to craft your own architecture. Its documentation and clarity of code make the learning curve gentle for PHP newcomers. ...
    Downloads: 45 This Week
    Last Update:
    See Project
  • 11
    MirageMUD

    MirageMUD

    VB6 stand-alone MUD client and server.

    MirageMUD is a source code base for developing your own stand-alone MUD client and server in Visual Basic 6. The code base comes with all the necessary basic functionality to immediately begin developing your MUD game right off the bat. A C# version of MirageMUD is currently in development: https://github.com/Xlithan/MirageMUD2
    Downloads: 114 This Week
    Last Update:
    See Project
  • 12
    CaptfEncoder

    CaptfEncoder

    Captfencoder is a rapid cross platform network security tool suite

    Captfencoder is a rapid cross-platform network security tool suite, providing network security-related code conversion, classical cryptography, cryptography, asymmetric encryption, miscellaneous tools, and aggregating all kinds of online tools. CaptfEncoder V3 develop by Rust, Executable programs are smaller, faster, better performing, and more powerful. CaptfEncoder V3 suport script extension.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 13
    Mongoose OS

    Mongoose OS

    IoT firmware development framework

    Mongoose OS, an IoT Firmware Development Framework. Supported microcontrollers, ESP32, ESP8266, CC3220, CC3200, STM32F4, STM32L4, STM32F7. Amazon AWS IoT, Microsoft Azure, Google IoT Core integrated. Code in C or JavaScript. Mongoose OS is integrated and powers many types of devices and appliances globally. Microsoft Azure IoT recommends Mongoose OS for OTA, automatic device management and deploying firmware updates at scale. Built-in flash encryption, crypto chip support, ARM mbedTLS optimized for small memory footprint. Device management dashboard service. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 14
    Offline First Database Comparison

    Offline First Database Comparison

    An implementation of the exact same app in Firestore, AWS Datastore

    In this project I have implemented the exact same chat application with different database technologies. You can use it to compare metrics and learn about the differences. The chat app is a web-based angular application, with functionality similar to Whatsapp Web. All metrics are measured automatically via code in a browser test (chrome:headless). The results heavily depend on the developer's device. You should compare the values relative to one another and not as absolute values. Also, you...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    peerweb.site

    peerweb.site

    Peer to Peer decentral Web Site hosting at your fingertips

    Peer Web Site supports content encryption aka. salting since v. beta 0.8.0. The code regarding this feature can be found at: EncryptDecrypt.js and ensures that the passwords/passphrases do net get saved nor sent anywhere. This is a very convenient feature to secure your content. Although, it can not encrypt IPFS nor WebTorrent files added to your site and purely encrypts the actual content, which you enter through the text editor or devtools, as well as embedded Base64 files. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    KISA Toolkit

    KISA Toolkit

    Korea Internet & Security Agency's Cipher Suite written in Go

    ... • LEA 128-bit Block cipher with 128/192/256-bit keys. • SEED 128-bit Block cipher with 128/256-bit keys. • HIGHT 64-bit Block cipher with 128bit key. Cryptographic Functions: • Symmetric Encryption/Decryption • Hash Digest • CMAC (Cipher-based message authentication code) • HMAC (Hash-based message authentication code) • PBKDF2 (Password-based key derivation function 2) Copyright (c) 2020-2021 Pedro Albanese - ALBANESE Lab Visit: http://albanese.atwebpages.com
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    RxTool

    RxTool

    A collection of tools that Android developers have to collect

    A collection of tools that Android developers have to collect, Alipay payment, WeChat payment (unified order), WeChat sharing, Zip4j compression (supports sub-volume compression and encryption), Scanning and generation of codes and barcodes. Commonly used Dialog. WebView package can play video, Imitation betta fish sliding verification code. Toast package, Vibration, GPS, Color Picker, ArcGis, VTPK, Compile and run, maybe you will find surprises. The development process often requires the use of a variety of tool sets, although most of them can be found with just a click of Google/Baidu.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18

    commons-crypt

    A library for easy use of symmetric encryption and decryption in java

    A library for easy use of symmetric encryption and decryption in java. Encrypt and decrypt with one line of code using common algorithms like AES. Requires Java 7 or later.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    ast-hook-forjs-re

    ast-hook-forjs-re

    AST-based JavaScript reverse engineering and variable tracing toolkit

    ast-hook-for-js-RE is an open source JavaScript reverse engineering toolkit designed to help analysts locate and understand client-side encryption logic used by web applications. It works by intercepting browser traffic through a local proxy server and modifying JavaScript code before it executes in the browser. Using Abstract Syntax Tree (AST) transformations, it injects hook functions into the code to monitor variable assignments and other runtime changes during execution. ...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 20
    .Net Core for Delphi/Lazarus

    .Net Core for Delphi/Lazarus

    The best library to work with the .Net Core from Delphi and Lazarus.

    The .Net Core for Delphi/Lazarus (dotNetCore4Delphi) is a .Net Core Runtime Library for Delphi which helps Delphi/Pascal developers work with .Net Core. It is designed to provide a way to interact with .Net Core applications from Delphi/Pascal. What dotNetCore4Delphi can do: - Access .Net Core Framework Class Library. - Access Third Party .Net Core Libraries. - Access Your .Net Core Libraries. - etc Competitive Advantages: - Cross-platform framework that runs on Windows, Linux and...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    MTProto

    MTProto

    Full-native go implementation of Telegram API

    Full-native implementation of MTProto protocol on Golang. All code, from sending requests to encryption serialization is written in pure Golang. You don't need to fetch any additional dependencies.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 22
    ...It is based on the work by Nintendo(r) European Reasearch and Development (NERD) and the "HireMe" challenge. I've taken the work of NERD a step further and used the input-confusion-diffusion paradigm in conjunction with SHA/256 encryption to generate randomized passwords that cannot be decoded (yet - quantum computers will change this eventually!) The software generates sufficiently random passwords to allow the same plaintext password to be used multiple times without generating the same output. There's probably no real reason to be developing this, but I wanted to use the NERD code in a new way and practice my C++ skills at the same time.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Encrypted Notepad
    加密記事本可加密你的文字,避免你的個人隱私隨意遭人窺探 協助翻譯軟體: https://github.com/oxygen-TW/Encrypted-notepad-traslation Update v3.6.0 1. Add counter. 2. Start change code to OOP. -------- A notebook software that can encrypt your text. It can protect the document have privacy! This software have English and other language support, you can change default language in "設定 -> 更改語言". If you can help me to translate language, please visit...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 24
    Crispy Synced Notes

    Crispy Synced Notes

    A note taking program with WebDAV sync

    ...Features: - group notes and images in a tree structure (using folders) - can work on any directory on your machine - technically works like a file browser with inline text editing - synchronizes with any WebDAV server (optionally using SSL/TLS) - allows one-way and two-way synchronization - allows to encrypt your files locally and remote using AES256 - multi language support You can obtain the full source code at: https://crispy-cow.de/git/CrispySyncNote.git Latest changes: 2.1.0: Updated for Java 9 and up 2.0.2: Added more UI translation, updated greek language (thanks to geogeo) 2.0.1: Bugfix: Sync state is now copied when duplicating workspace due to change in encryption settings
    Downloads: 4 This Week
    Last Update:
    See Project
  • 25
    .Net Runtime Library for Delphi

    .Net Runtime Library for Delphi

    This is the best library to work with the .Net framework from Delphi.

    The .Net Runtime Library for Delphi (CNClrLibrary) is the best library to work with .Net framework and .Net libraries from Delphi. It is designed to provide a way to interact with applications written in anyone of the .Net languages (such as C#, Visual Basic.Net, Delphi.Net, JScript.Net, etc) from Delphi. CNClrLibrary allows Delphi to use .Net libraries without the need for registry entries, COM registrations, or changes to the .NET libraries. Competitive Advantages: - No extra dll...
    Leader badge
    Downloads: 5 This Week
    Last Update:
    See Project